Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the CWNP CWNA CWNA-109 Questions and answers with ValidTests

Exam CWNA-109 All Questions
Exam CWNA-109 Premium Access

View all detail and faqs for the CWNA-109 exam

Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which one of the following is not a factor considered when calculating the Link Budget for an outdoor point-to- point WLAN bridge link?

Options:

A.

Operating frequency

B.

MU-MIMO capabilities of the bridges

C.

Receive antenna gain

D.

Transmit power

Expert Solution
Questions # 32:

You are implementing a multi-AP WLAN and fast secure roaming is essential. Which one of the following methods is an IEEE 802.11 standard method for fast roaming?

Options:

A.

FT

B.

OKC

C.

Load balancing

D.

Band steering

Expert Solution
Questions # 33:

What can cause excessive VSWR in RF cables used to connect a radio to an antenna?

Options:

A.

High gain yagi antenna

B.

Radio output power above 100 mW but below 400 mw

C.

High gain parabolic dish antenna

D.

Impedance mismatch

Expert Solution
Questions # 34:

You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disabled the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field.

Your manager suggests implementing these security practices. What response should you give to this suggestion?

Options:

A.

Any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons frames. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames.

B.

To improve security by hiding the SSID, the AP and client stations must both be configured to remove the SSID from association request and response frames. Most WLAN products support this.

C.

Any tenants in the same building using advanced penetration testing tools will be able to obtain the SSID by exploiting WPA EAPOL-Key exchanges. This poses an additional risk of exposing the WPA key.

D.

This security practice prevents manufacturers’ client utilities from detecting the SSID. As a result, the SSID cannot be obtained by attackers, except through social engineering, guessing, or use of a WIPS.

Expert Solution
Questions # 35:

802. 11ax (HE) introduces Resource Units that can be used to allow communications with multiple devices at the same time, on the same channel, in the same BSS. What feature of 802.1 lax provides this functionality?

Options:

A.

6 GHz support

B.

TWT

C.

Wi-Fi-LTE

D.

OFDMA

Expert Solution
Questions # 36:

A string of characters and digits is entered into an AP and a client STA for WPA2 security. The string is 8 characters long. What is this string called?

Options:

A.

MSK

B.

WEP key

C.

Passphrase

D.

PSK

Expert Solution
Questions # 37:

What factor is likely to cause the least impact on the application layer throughput of an 802.11n client station in a 2.4 GHz HT BSS?

Options:

A.

Increasing or decreasing the number of spatial streams in use by the client station and AP

B.

Implementing Fast BSS Transition (FT) for roaming

C.

Implementation of several other clients in the same BSS using 802.11g radios

D.

RF interference from more than 10 nearby Bluetooth transmitters

Questions # 38:

When using a spectrum to look for non Wi-Fi interference sources, you notice significant interference across the entire 2.4 GHz band (not on a few select frequencies) within the desktop area of a users workspace, but the interference disappears quickly after just 2 meters. What is the most likely cause of this interference?

Options:

A.

USB 3 devices in the user’s work area

B.

Bluetooth devices in the user’s work area

C.

Excess RF energy from a nearby AP

D.

Unintentional radiation from the PC power supply

Questions # 39:

When a client station sends a broadcast probe request frame with a wildcard SSID, how do APs respond?

Options:

A.

Each AP responds in turn after preparing a probe response and winning contention.

B.

For each probe request frame, only one AP may reply with a probe response.

C.

Each AP checks with the DHCP server to see if it can respond and then acts accordingly.

D.

After waiting a SIFS, all APs reply at the same time with a probe response.

Questions # 40:

A client STA must choose the best AP for connectivity. As part of the evaluation, it must verify compatible data rates. What can the client STA use to verify that an

AP supports the same data rates that it supports?

Options:

A.

Beacon frames transmitted by the AP

B.

Data frames sent between the AP and current clients STAs

C.

Authentication frames transmitted by the other client STAs

D.

Probe request frames transmitted by other client STAs

Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions